Cooperative secure transmission relying on optimal power allocation in the presence of untrusted relays, a passive eavesdropper and hardware impairments

M Moradikia, H Bastami, A Kuhestani, H Behroozi… - IEEE …, 2019 - ieeexplore.ieee.org
In this work, by considering a variety of realistic hardware impairments, we aim to enhance
the security of a cooperative relaying network, where a source intends to transmit its …

Cooperative jamming-assisted untrusted relaying based on game theory for next-generation communication systems

N Zamir, B Ali, MFU Butt, MA Javed, BM Lee, SX Ng - Applied Sciences, 2023 - mdpi.com
In this contribution, we investigate the performance of an untrusted relaying system when
Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying …

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

Y Huo, M Xu, X Fan, T **g - EURASIP Journal on Wireless …, 2018 - Springer
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-
based Internet of things. In such systems, a pair of primary user devices (PUs) can only …

A reassessment on friendly jamming efficiency

R **, K Zeng, K Zhang - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
With the rapid and continuous growth of various types of wireless devices in IoT, securing
the communications among heterogeneous devices becomes an emerging issue. A physical …

Secrecy performance for multiple untrusted relay networks using destination-based jamming with direct link

DPM Osorio, EEB Olivo, H Alves - 2018 IEEE 29th Annual …, 2018 - ieeexplore.ieee.org
We propose a destination-based jamming scheme for cooperative networks with multiple
untrusted amplify-and-forward relays, in which the destination operates in full-duplex mode …

Optimal power allocation for physical layer security in device‐to‐device communications using untrusted relays

M Izanlou, A Mohammadi… - Transactions on …, 2019 - Wiley Online Library
In this paper, the physical layer security is studied in device‐to‐device (D2D)
communications overlaying cellular network where a D2D pair communicates with each …

Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone

JE Giti, A Sakzad, B Srinivasan, J Kamruzzaman… - Journal of Network and …, 2020 - Elsevier
In this paper, we consider deceptive friendly jammers in a half-duplex random wireless
network against a group of adaptive eavesdroppers. The destinations, eavesdroppers and …

Friendly spectrum jamming against MIMO eavesdrop**

R **, K Zeng, C Jiang - Wireless Networks, 2022 - Springer
Friendly spectrum jamming is a flexible scheme to establish secure communications among
heterogeneous wireless devices without the need of encryption. Previous works have …

Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers

JE Giti, B Srinivasan… - 2017 IEEE Globecom …, 2017 - ieeexplore.ieee.org
We consider the problem of security in wireless multicasting for a multiple-input multiple-
output (MIMO) relay-aided system. The network suffers from a group of adaptive …

An embedded architecture for mission control of unmanned aerial vehicles

E Pastor, J López, P Royo - … on Digital System Design (DSD'06), 2006 - ieeexplore.ieee.org
This paper presents an embedded hardware/software architecture specially designed to be
applied on unmanned aerial vehicles (UAV). With the advent of emerging civil applications …